
Product Overview
The second-generation firewall system is a new generation of application security gateway product that comprehensively guarantees L2-L7 layer security. The product is based on high-performance software and hardware architecture, using the next generation threat detection engine, based on intelligent user recognition and intelligent application recognition, achieving a completely user and application centered control strategy. From the perspectives of users, applications, and behaviors, all traditional firewall functions such as access control, attack protection, and QoS have been re implemented, and advanced abstractions have been made based on these functions to provide intelligent control methods such as user policies, application policies, and behavior policies. Combined with its own threat detection and defense capabilities, it effectively solves the problem that traditional firewalls cannot prevent new threats. At the same time, it provides rich and intuitive visual information, which makes it easy to view the effectiveness of strategy implementation, locate network problems, and facilitate making more reasonable network security planning and investment decisions.
Features
Based on the next-generation threat detection engine:Equipped with a self-developed next-generation threat detection engine, the core technology is independently controllable, capable of judging massive known threats, accurately identifying and eliminating popular Trojans and stubborn viruses, and reducing the risk of foreign technology dependence. The engine extracts the core malicious behavior of viruses as detection rules, effectively responding to the evolution and deformation of viruses, and building a local detection library with millions of rules, which can detect billions of virus samples. Developed with advanced scientific architecture and efficient algorithms, it is a very fast network virus detection engine. Meanwhile, unlike cloud detection, the detection method of local massive virus databases eliminates the need for network transmission time.
Comprehensive and precise intrusion defense capability:Centered around the core of "deep defense and precise blocking", through accurate analysis and judgment of deep attack behaviors in the network, immediate blocking is carried out after being judged as an attack behavior, actively and effectively protecting network security. After years of accumulation and accumulation in the field of network security, the company has built a senior team of attack feature libraries and security service teams, closely tracking the global network security situation, real-time grasping the latest attack technologies and trends, improving the attack feature library, and providing the most comprehensive, timely, and accurate intrusion defense capabilities. The system supports over 3000 predefined attack features, which can be updated in real-time online. It can effectively protect against attacks such as worms, SQL injection, and overflow, ensuring basic network security. Through graded event and operation configuration, as well as virtual patch management, it provides humanized security protection for the network.
Industry leading advanced threat linkage defense capability:It can be linked with the sandbox system to quickly and deeply analyze massive samples, and complete advanced threat detection and defense within an acceptable time. The Shadow Chasing Threat Analysis System can effectively analyze and identify various known and unknown threats, combined with the comprehensive and accurate threat blocking function of firewalls, greatly enhancing customers' advanced threat countermeasures capabilities and achieving accurate and real-time online blocking defense.
Cloud unified management capability based on API interface:Provide an independent cloud management platform that can unify the management of massive devices, achieve device status monitoring, automatic configuration distribution, batch version upgrades, and cloud upgrades for URL, IPS, AV, and application feature libraries. At the same time, the cloud management platform can collect and analyze security threats and log information, comprehensively display the user's network security situation, facilitate the user's grasp and adjustment of the overall network, and provide convenience for operation and maintenance.
典型部署

